This HTML5 document contains 13 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n5http://dbkwik.webdatacommons.org/resource/JZK7RwE-9uTp7P-hk7qJrA==
n11http://dbkwik.webdatacommons.org/ontology/
n16http://dbkwik.webdatacommons.org/resource/TVwvNU4-d_LvWw2YrCFDZg==
dctermshttp://purl.org/dc/terms/
n12http://dbkwik.webdatacommons.org/resource/HovNODxkCDeUNKY2k5WKBg==
n8http://dbkwik.webdatacommons.org/resource/YKgLOQg-jjW-_izFLEkC4Q==
n4http://dbkwik.webdatacommons.org/malware/property/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n15http://dbkwik.webdatacommons.org/resource/7EMrTGtbNeiE2vyd6KpkGw==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n2http://dbkwik.webdatacommons.org/resource/u9kQ3JX5AizAvcDNpjOr9g==
n10http://dbkwik.webdatacommons.org/resource/F_j8ASzeeVYnurM3HJQXEA==
n13http://dbkwik.webdatacommons.org/resource/s9eMXafEi5iNuh7B4ne2kg==
n7http://dbkwik.webdatacommons.org/resource/HZre5SBSWxhour8f47cvJQ==
xsdhhttp://www.w3.org/2001/XMLSchema#
n9http://dbkwik.webdatacommons.org/resource/6hHN-muilW-lUmjLB6nWpA==
n14http://dbkwik.webdatacommons.org/resource/yU8B3pAmMJ9zsRO03C1zMA==
Subject Item
n2:
rdfs:label
IRCBot
rdfs:comment
Backdoor.Win32.IRCBot is a backdoor computer worm that spreads through MSN Messenger and Windows Live Messenger. Once installed on a PC the worm copies itself into a Windows system folder, creates a new file displayed as "Windows Genuine Advantage Validation Notification" and becomes part of the computer's automatic startup. In addition, it attempts to send itself to all of the user's MSN contacts via and attachment named 'photos.zip'. Executing this file will install the worm onto the local PC. The Win32.IRCBot worm provides a backdoor server and allows a remote intruder to gain access and control over the computer via an Internet Relay Chat channel. This allows for confidential information to be transmitted to a hacker. Because of a lack of standard naming conventions and also because of
dcterms:subject
n7: n9: n10: n13: n14: n16:
n4:wikiPageUsesTemplate
n5: n8: n12: n15:
n11:abstract
Backdoor.Win32.IRCBot is a backdoor computer worm that spreads through MSN Messenger and Windows Live Messenger. Once installed on a PC the worm copies itself into a Windows system folder, creates a new file displayed as "Windows Genuine Advantage Validation Notification" and becomes part of the computer's automatic startup. In addition, it attempts to send itself to all of the user's MSN contacts via and attachment named 'photos.zip'. Executing this file will install the worm onto the local PC. The Win32.IRCBot worm provides a backdoor server and allows a remote intruder to gain access and control over the computer via an Internet Relay Chat channel. This allows for confidential information to be transmitted to a hacker. Because of a lack of standard naming conventions and also because of common features, variants of Win32.IRCBot can often be confused with the Agobot and Spybot family of worms. For example Sophos lists Backdoor.Win32.IRCBot.ul, W32/Poebot-JT worm, and Win32/IRCBot.TS as aliases of the W32/Gaobot.worm.gen.e worm, a member of the Agobot family.[3]